• 2.2. Purify the cyberspace environment
  • Research on firewall technology and its application in computer network security strategy Peihong Wang




    Download 234,35 Kb.
    Pdf ko'rish
    bet2/13
    Sana28.01.2024
    Hajmi234,35 Kb.
    #147542
    1   2   3   4   5   6   7   8   9   ...   13
    Bog'liq
    Research on firewall technology and its applicatio

    2. The importance of firewall 
    Firewall is a separator, limiter and analyzer, which has 
    strong anti-attack capability. 
    2.1. Preventing the leakage of important 
    information 
    In the current era of big data, people's means of 
    communication and data transmission have been greatly 
    developed, and more and more personal information, 
    enterprise information, government information and other 
    data are flooded into computer networks or stored on the 
    cloud through computer networks, which brings great 
    convenience to people's production, life, work and 
    management, but at the same time poses a greater challenge 
    to computer network security. In this process, firewall 
    becomes a barrier to protect data information and provides a 
    strong guarantee for computer network security. With the 
    development of mobile communication technologies such as 
    5G, the role of firewalls is reflected in how to prevent a large 
    amount of personal data and private information from being 
    leaked or illegally stolen in the popularization of mobile 
    Internet applications. 
    2.2. Purify the cyberspace environment 
    With the use of computers and a large number of mobile 
    devices, people are coupled to computer networks more and 
    more, and at the same time there will be more risks of 
    malicious access to user information and data, there will be 
    many induced malicious invasion of websites or applications, 
    it is difficult for non-professional users to identify their 
    malicious behavior from the surface, such means as this 
    abound in the current computer network environment, 
    seriously disrupting the current computer network 
    environment is seriously disturbed. In this environment, 
    setting up directional firewalls for network use and 
    configuring corresponding filtering policies can largely assist 
    users in scientifically identifying fake websites, inducing 
    malicious network attacks and other behaviors, thus purifying 
    the cyberspace environment. 

    Download 234,35 Kb.
    1   2   3   4   5   6   7   8   9   ...   13




    Download 234,35 Kb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Research on firewall technology and its application in computer network security strategy Peihong Wang

    Download 234,35 Kb.
    Pdf ko'rish